NEW FACETS OF CYBER WAR

War, as such, had different ways and countermeasures. Developments in the broader sense, were included and climbed on the full spectrum of social, political, military, cultural, religious and economic.

Sources that formed the basis of conflicts that have been and are many and varied, ranging from simple contradictions of economic, political, national, religious, ethnic, social, etc. At the same time, each of these contradictions had a certain logic born of a complex of causes, which made it difficult, somewhat, a strict classification.

DRIVERS IN GENERATING CONFLICTS

As in the case of classic conflicts, the virual space conflicts are found a multitude of factors, which can be:

Economic factors

In cyberspace, we assist to a standing “competition” aimed at fulfilling the strategic objectives of economic and industrial STN (competitors or opponents), multinational organizations (NGOs) or other State actors, as well as military objectives promoted by some of these actors. If, in the case of a classic conflict of the military conflict initiators were unstable economies and States with a low level of production, we will notice that virtual attacks range from emerging States or having a privileged economic situation, the targets being the economic competitors in the market, banks, government agencies or providers of cyber security systems.

Political factors

Most of the times we noted that, in the event of military conflicts are involved certain political circles who want the replacement of rule of law of the State concerned. In cyberspace, we will witness the utterly different kind of non-military events, aimed at defaming political leaders, intoxication, propaganda, disinformation and the manipulation of public opinion with regard to their activities (promoted mainly through social networks), identity theft.

Social factors

It says that the virtual space we don’t have casualties, meaning the casualties resulting from a military conflict!

The experience of recent years has shown us that that CyberWar actions are impacting very high on the social factors and spreads in the sphere of interpersonal relations (groups, parties, movements) in society (e.g., the Arab spring, migrations, instated by the terror some terrorist groups, social crises, challenging some of the achievements in the social plan by some Governments, attracting masses to “spontaneous gatherings”, etc.), aimed at creating social tension and disarray in a rival State. On these factors depends the degree of preparedness for conflict of various social groups, of the population in the region, in order to improve their conditions of existence.

Military factors

Of course, the basis of the above events are mainly purely military factors, which are no longer defined by resolving problems by using force, but with the methods and strategies adapted to the time and current technologies.

Essentially, the goal is the same: to reveal the degree of influence of each of these factors with reference to a concrete case of worsening political and military situation of a State or of a supra-national economic entities competing.

Thus, military conflict should be regarded as an exclusive form, when any counter-measures taken to settle a conflict in cyberspace has not given expected results and produced substantial damage to the system, and supreme form, if the level of straining exceeded regional segment and has global impact, marking life and international security.

Features to be taken into account in the analysis of the contents and the attempt of systematization of the structure and of the main evolution stages of the military conflict, caused by the CyberAttack:

DESTRUCTIVE CONFLICT

BENEFICIAL CONFLICT

Characteristics

The conflict is generated by security breaches, organizational errors or inconsistency between the objectives

The conflict may cause the removal of security breaches, troubleshoot organization errors and establish consistency between the objectives

The conflict was out of control, not being settled in early phase

Conflict resolution must be started at the first signal of dispute

The problems were so acute that they could reach an agreement

Communication between the sides must be sincere, direct, complete, using all channels of dialogue and communication

Communication between the parties is difficult or lacking in sincerity

The dialogue should enable each party to express all the arguments

The parties do not show availability for resumption of the dialogue

The parties must prove availability for principle and troubleshooting details

You have to go on the premise that the parties can win equally from the declared conflict

Means to obtain advantages over competitors

The Parties shall act in force, in defiance of legal provisions, misrepresenting the reality and providing media information partially true (partial truths are lies, through omission)

There is no desire for obtaining benefits by one party at the expense of the other party

Evolution

Escalating conflict continues

With the evolving conflict intensifies efforts to identify ways of defusing and resolving

Costs of interruption of activities increase

The number of people involved in the dialogue grows

Decrease chances of resolving through understanding

Investments of each party increase proportionallywith the importance of negotiation and crisis phase

Factors of influence

The importance and number of divergent problems

The importance and number of divergent problems

To accommodate the growing segments of employees and employees of other units or branches of production

To accommodate the growing segments of employees and employees of other units or branches of production

Acceptance of costs involved

Acceptance of costs involved

The number of moral constraints suppressed

Number of moral constraints cannot be removed

Effects

Loss of production and partial loss of Organization prestige

The conflict has allowed solving other problems related to organization and operation

Human relations deteriorate

Increase social cohesion staff

Decreases the social cohesion of the members of the Organization (especially when patronage uses techniques of manipulation and division)

Increase the potential of human resources

Unrecoverable loss may be the entrance procedure for bankruptcy, closing the unit or take it over by other economic and financial structures

The staff gets or strengthens the role of partner of employers

The Organization strengthens the prestige andwin in the field of organization and production

Increase staff attachment toward Organization

The organization achieve optimal resource use phase

Labor conflict can be the engine of change process

The elements, strategy, goals and the features of such actions, not of the scale of the present ones, have been researched and described by thinkers like Sun Tzâ, Xenofon, Machiavelli, Liddel Hart, Libicki and others.

These concerns included:

 your opponent’s strategy and plans;

 military information infrastructure;

 command-and-control systems;

 the civil infrastructure.

Even though the analysts level was said in early 2000 that CRS Western-style societies, will finish this IT transition over a period of between 15-20 years, this term is no longer topical. Technological leaps have demonstrated that mutations suffered in recent years have resulted in substantial changes to the macro-scale corporations and political-military alliances, with effects on the security of individual information from the global sphere, cyberspace has become a “battle field” for defending the interests of humanity.

New fields of competition have caused themselves the emergence of new attributes of the CyberWar and CyberSecurity. Turn of the 21st century right next to events like these challenges are permanent, multimodal and, besides the dual aspects in addition to “dress up” hybrid shapes, increasingly difficult to manage (if the conflict in Ukraine).

In the new asymmetric multimodal context, appropriate global strategies are needed, to integrate collection, protection, transport, management and limiting the access to information, not only during times of crisis or conflict.

Multidisciplinarity CyberSecurity involves reactions in C4I plans as a whole society, and may be based on the concepts of system-level multimodal complex systems.

Duality in the context of this analysis, define as a common strategy for the military and civilian spheres which intertwine increasingly more!

Current events have shown that most often than not the States and the categories of military forces have absolute monopoly on the violent means and, in particular, the “informational violence”. Using this approach, we note that State-level strategic centre of gravity shifted gradually toward civil infrastructure which has become the most important goal – banking, finance, energy and systems of systems fields being vulnerable while defending their conventional forces becoming problematic.

New challenges have demonstrated that CyberWar and CyberSecurity are using offensive and defensive information and systems that operate them, to exploit, corrupt and destroy adversary information and information systems, also protecting their own information and systems.1

Basic Forms of Cyber War

IW FORMS

EVENTS

Actions of command and control (C2W)

Informational supremacy

Designing own informational systems and those for countering the opponent

protection of own systems and those of their allies

annihilating informational systems of the enemy and the “pirate” ones located on own territory (national or of political-military alliance)

dominance of the cyber and informational space

Electronic actions (EW)

radio-electronic combat techniques

encryption-decryption penalties

Psychological actions (PsW)

information

misinformation

propaganda

manipulation

subliminal influencing techniques used for the purposeof a change in attitudes and choices the allies, neutrals and opponents

Actions of hackers

modification of information content

destruction of information

destruction of computer systems

use of the data on behalf of the opponent

software piracy

the explosion of the IT viruses

Economic actions (EIW)

blocking or channeling economic informations

denial of facilities and loans

invading the market of the adversary with products, aimed at bankruptcy of the national economy

economic crash

falsifying national currency

blocking or channelling of economic information

failure of facilities and loans

invading the opponent’s market with products for the purpose of national economic Manager of bankruptcy

stock market crash economic

counterfeiting national

Actions in cyberspace (CYBW)

In the context of computer attacks, both military and civil actions are based on the following principles:

the“beheading”principle through which the separation of the primary targets of the decision-making support and communication networks is achieved;

thesensory intuition principle that takes into account the annihilation and destruction of opponent’s sensors;

the interoperability principle that requires implementation of optimal network communication between own structures and the allied one;

the knowledge principle has as basic requirement an assimilation and management of the greatest amounts of information about (ones) own systems, those of allies and opponents;

the survival principle – is vital to the establishment of strategies and policies of information war and it is achieved by:

an opponent’s actions foreseen;

a centralized leadership information actions;

achieving effective communication between organizational levels;

a decentralized planning and implementation of information actions;

the hierarchy principle;

he intensity principle.

In terms of conducting operations type Cyber (War or Security) we should keep in mind the following:

PRINCIPLE OF UNCERTITY

creation moods of:

distrust

anxiety

anguish

fear

manifests through:

constant dissimulation

uncertainties regarding

course of combat actions

goal of combat actions

time of commencement

venue

action form

forces used

insured assets

adopted methods

dwelling in:

hypotheses

– assumptions

hesitations

inaccuracies

practical application of:

classical procedures specific to the intelligence operations

keeping the secret

surprise

mobility

elimination of routine and repetition

flexibility

diversity of the forces and means

spying

collecting and transmiting sending informations

research

parallel diplomacies

alliances

manipulation in mass-media using:

misinformation

propaganda

intoxication

issuance of rumors

desuetude

THUNDERBOLT PRINCIPLE

breaking the rhythm of the opponent’s combat actions

executing extremely fast and efficient strikes in key moments of combat actions of the adversary, for:

thwarting the actions favorable to the enemy

destruction of cohesion

destruction of logistical flows

affecting the moral of the troops

procedures

taking by surprise

saving military forces and resources

instantaneity of the effects

synchronizing simultaneous media

freedom of action

cooperation

concentration of troops

change of pace

based on

the multiplication of force

use of specific electronic war means and actions

The targets of the new war in cyberspace, were studied by Michael Wilson1 – member of „Nemesis” group – and they can be:

The irregular nature of the expansion of cyber aggressions suggests the fact that its borders were not clearly defined.

CONCLUSIONS

Every citizen relies on existing networks and lives with them and in them. Almost no one thinks how often he/she uses different networking infrastructure. And for very few it is clear that these networks are becoming increasingly sensitive.

Enterprises, companies and other organizations live in this world of networks, as well as ordinary citizens. In order to be able to maintain productivity, firms must be able to rely on these infrastructures. Key element for for setting the emplacement of a company is, ultimately, the existence of infrastructure needed in the chosen area. Society is subjected to a permanent interaction with these networks. Networks are not only the fundaments of a State, but also an illustration of civilization. Every person is formed and influenced by the surrounding networks. Radio, television, newspapers, books and the Internet transmitted information and manifest themselves as a mediumfor training education. The social network – from schools to the hospitals – forms people’s behavior. Almost every network has some influence on daily life of common problem and thereby on behavior.

Globalization of the networks becomes a reality. Roads, phones, railways, airways and maritime ones, as well as the Internet does not stop at State borders. There are almost no borders that should not be crossed by networks. For a state, networks have a value that can not be quantified.

Networks are legacies from the previous generation, and as such, are to be transmitted securely to the next generations, which is why the protection of networks is an important task and an obligation for the State.

Networks are particularly sensitive infrastructures, which “incites” to sabotage – in times of war, as the primary and secondary targets, and in times of peace, as targets for terrorists -, with effects that can not be overlooked. By equipping with computers, they can be attacked from any place on Earth.

Protection means, first and foremost, awareness of the vulnerability of our society based on networks (through creating a “network ethics”);protection must be financed and institutionalized at all the levels. It involves learning and developing the technologies and defense mechanisms.

The best way for defending the networks continues to be represented by the development of secure connections as possible between all interconnected networks.